home *** CD-ROM | disk | FTP | other *** search
- %%2%%
-
- This is a small sample 'C' program. It reads
- an input file, and writes out 80 byte records.
-
- You can page up and down through the text to
- see the complete source details, then press
- <Esc> to continue.
- %%3%%
- Shown here are details of the parameters
- used to control ShroudIt! processing.
-
- This base set does only variable name
- replacement and nothing else.
-
- Reviewing allows you to see the extensive
- control you have over the whole process.
- %%6%%
- This is an example of the MAP produced by
- ShroudIt! You should never distribute
- the map with your shrouded source!
-
- The map allows you to see which obfuscated
- name corresponds to the original variable.
- After each name pair is the line number
- cross reference to the original code.
- %%7%%
- Shown here are details of the parameters
- used for maximum shrouding.
-
- This includes compression and keyword
- obfuscation.
-
- Reviewing allows you to see how to setup
- parameters for this level of use.
- %%9%%
- Shown here are details of the include file
- produced. The include file is always named
- nnnnnnnn.SHR, and contains constant definitions
- and redefines.
-
- You can page up and down through the text to
- see the complete details.
- %%10%%
- To order, just print off the ORDER file,
- complete the details, and mail. Remember
- you MUST be licensed to distribute shrouded
- source.
-
- You can page up and down through the form to
- see the complete order details, then press
- <Esc> when done.
- %%11%%